Showing headlines posted by linuxer
( 1 2 3 4 5 6 ... 37 ) Next »ZFS Deduplicaton: Save Disk Space
ZFS Deduplication Explained: Learn how ZFS deduplication works by eliminating identical data blocks. We demonstrate the feature, compare results with dedup on and off, and discuss RAM requirements and best use cases. ZFS deduplication is powerful for environments with highly redundant data like VM images or backup repositories. However, for general use cases like web hosting, compression is usually a better choice due to lower RAM requirements.
Modern CLI Tools: Time to Forget LS and CAT
The command line remains the most powerful interface for Linux users, but traditional Unix tools like ls, cat, grep, and find are showing their age. A new generation of CLI tools offers significant improvements in speed, usability, and features. In this tutorial, we explore 10 modern alternatives that will transform your daily workflow and boost your productivity.
Becoming a Security Engineer: Linux-Focused Roadmap for Offensive and Defensive Paths
Linux has become the backbone of modern IT infrastructure, powering the majority of web servers, cloud platforms, and even the most popular security tools used by professionals worldwide. For cybersecurity professionals, strong Linux skills are no longer optional-they're essential. Whether your goal is to break into systems as an ethical hacker or defend and secure them against malicious actors, a solid foundation in Linux will be at the core of your career. The cybersecurity field offers two distinct but complementary paths for Linux-focused professionals: offensive security (Red Team) and defensive security (Blue Team). Each path requires deep technical expertise, but they approach security challenges from opposite perspectives. Understanding both paths-their overlapping fundamentals, unique specializations, and career trajectories-is crucial for anyone looking to build a successful career as a Linux Security Engineer.
Docker: Patch Image Vulnerabilities with Trivy and Copa
Docker container images often contain security vulnerabilities inherited from their base operating system packages. Rather than rebuilding images from scratch, you can use Trivy to scan for vulnerabilities and Copa to patch them directly. This tutorial demonstrates how to identify and fix container vulnerabilities on Ubuntu, Debian, RHEL, CentOS, and Fedora systems using these two powerful open-source tools.
ntpdate Command not Found: Solution
The ntpdate command has been deprecated and removed from modern Linux distributions. If you encounter the “ntpdate command not found” error on Debian, Ubuntu Linux systems, this guide shows you how to synchronize your system time using the modern replacements: systemd-timesyncd and chrony.
Linux Career Opportunities in 2025: Skills in High Demand
The Linux job market has reached unprecedented heights in 2025, with demand for professionals who possess Linux expertise continuing to surge across multiple technology sectors. Organizations worldwide are prioritizing candidates who can leverage Linux systems in cloud-native environments, AI operations, and DevOps workflows.
How to Use OpenAI Whisper Voice-to-Text with NVIDIA GPU on Debian/Ubuntu
OpenAI Whisper is a powerful speech recognition system that can transcribe audio files with impressive accuracy. When combined with NVIDIA GPU acceleration through CUDA, Whisper can process audio files significantly faster than CPU-only processing. This guide demonstrates how to install and use Whisper with GPU support on Debian and Ubuntu Linux systems.
How to Install CUDA on Ubuntu Linux
The Nvidia CUDA toolkit is an extension of the GPU parallel computing platform and programming model. The Nvidia CUDA installation consists of inclusion of the official Nvidia CUDA repository followed by the installation of relevant meta package and configuring path the the executable CUDA binaries. In this tutorial, you will see how to install CUDA on Ubuntu Linux. This will get your video graphics running with the latest drivers and software available.
How to Install PyTorch with CUDA on Ubuntu
PyTorch is an open-source machine learning framework that enables developers to build and train neural networks for AI applications. When combined with NVIDIA CUDA, PyTorch can leverage GPU acceleration to perform computations up to and even over 100 times faster than CPU-only processing. In this tutorial, you will learn how to install PyTorch with CUDA support on Ubuntu Linux, enabling you to harness the full power of your NVIDIA GPU for machine learning and deep learning tasks.
How to install the NVIDIA drivers on Fedora
The NVIDIA Driver is a program needed for your NVIDIA Graphics GPU to function with better performance. It communicates between your Linux operating system, in this case Fedora, and your hardware, the NVIDIA Graphics GPU.
Rayhunter Tutorial: Convert a Verizon Orbic Speed RC400L into a Stingray Detector
In this tutorial, we will show you how to install Rayhunter on a Verizon Orbic Speed RC400L mobile hotspot using Kali GNU/Linux on a x86_64 architecture computer. This article will also detail accessing the Rayhunter web interface, maintaining your Rayhunter, and [optionally] reporting Cell Site Simulator (also known as IMSI-catcher or “Stingray”) detection data to the Electronic Frontier Foundation (EFF) for further analyzation. Rayhunter setup is cheap (~$20) and user-friendly – a project for technical and less-technical users alike!
Debian 13 Nvidia Driver Installation
The NVIDIA GPU drivers are essential for utilizing the full capabilities of NVIDIA graphics cards on Linux systems. Whether you’re setting up a bare metal Debian installation or configuring GPU passthrough in a virtualized environment, the driver installation process remains consistent. This guide will walk you through installing the proprietary NVIDIA drivers on Debian 13 (Trixie), ensuring your graphics card is properly recognized and functional for gaming, CUDA computing, or professional workloads.
Build a Simple Linux Intrusion Detection System in Bash for Home Networks
Home networks have grown considerably with smart TVs, IoT devices, phones, and tablets all connecting to our routers. This tutorial will guide you through building a lightweight Linux intrusion detection system using Bash script that monitors what devices are connecting to your network. Think of it as a basic network “doorbell” – it alerts you when someone new shows up.
Rising Impact of Linux Gaming: Unprecedented Growth and Future Outlook
The Linux gaming platform reached new heights, with Steam’s hardware survey showing Linux surpassing 2% market share for the first time. More than a milestone, it marks a shift in how the industry views Linux as a serious contender for mainstream gaming.
Ubuntu Studio 25.10 “Questing Quokka” Beta Launched
Ubuntu Studio 25.10 “Questing Quokka” Beta has officially launched, bringing significant improvements to creative professionals and multimedia enthusiasts. This latest Ubuntu Studio 25.10 release introduces major desktop environment upgrades, enhanced audio production capabilities, and substantial updates to creative applications that position it as a leading choice for content creators.
Chromium 140.0.7339.80 Security Update Released: Critical Vulnerability Fixes for Linux Users
The Chromium 140.0.7339.80 security update has rolled out across major Linux distributions, delivering critical vulnerability fixes that strengthen browser security for millions of open-source desktop users. Released on September 12, 2025, this latest Chromium browser update addresses four significant security flaws while maintaining the performance and compatibility that makes Chromium the foundation for numerous web browsers in the Linux ecosystem.
GNOME 49 Release Candidate Restores X11 Support in GDM
The GNOME desktop environment has taken a significant step back from its controversial X11 deprecation with the release of GNOME 49 Release Candidate, which restores default X11 support in the GDM display manager. This major policy reversal addresses widespread community concerns and ensures better hardware compatibility for Linux users who have struggled with Wayland-only sessions.
How to Find Nginx Cache File Location on Linux
When using Nginx as a reverse proxy, enabling caching can dramatically improve performance by reducing backend load and speeding up response times. However, there are situations where you may not want to clear the entire cache, but instead only remove a cached copy of a specific page. This guide shows you how to configure Nginx caching, generate cache files, and locate them on disk so you can purge individual items without dropping the full cache.
KDE Announces Alpha Release of KDE Linux: A New Era in Operating System Development
The KDE project has officially announced the alpha release of KDE Linux, marking a significant milestone in the organization’s expansion beyond desktop environments into full operating system development. This groundbreaking immutable distribution represents KDE’s first official operating system, unveiled at Akademy 2025 and designed to serve as the definitive reference implementation for KDE Plasma and applications.
Debian 13.1 “Trixie” Released with Crucial Security Updates and Stability Improvements
The Debian Project has released Debian 13.1 “Trixie,” the first point release of the stable Debian 13 distribution, delivering crucial security patches and system stability improvements. Released on September 6th, 2025, this maintenance update addresses critical vulnerabilities and resolves significant bugs that could impact production environments running Debian 13 “Trixie”.
